Bonum Certa Men Certa

The Practice of Ritual Defamation (Relevant to Cancel Mobs)

Summary: Published on April 26, 2021. Reproduced with permission from here.

Written in 1990, this short essay by Laird Wilcox[1] is pertinent today and specially applicable to the defamation of Richard Stallman. The modus operandi described by Wilcox matches seamlessly the procedure adopted by Stallman's attackers. We are reproducing it verbatim from the original[2] with permission from the author. A 5 minutes read worth one or two whole books on the subject.



Note on licensing: This article is an exception to the default CC-BY-SA license of this site. The author did not grant the public copying permission for this article.





The Practice of Ritual Defamation
How values, opinions and beliefs are controlled in democratic societies



by Laird Wilcox - 1990



Defamation is the destruction or attempted destruction of the reputation, status, character or standing in the community of a person or group of persons by unfair, wrongful, or malicious speech or publication. For the purposes of this essay, the central element is defamation in retaliation for the real or imagined attitudes, opinions or beliefs of the victim, with the intention of silencing or neutralizing his or her influence, and/or making an example of them so as to discourage similar independence and “insensitivity” or non-observance of taboos. It is different in nature and degree from simple criticism or disagreement in that it is aggressive, organized and skillfully applied, often by an organization or representative of a special interest group, and in that it consists of several characteristic elements. #aggressive



Ritual Defamation is not ritualistic because it follows any prescribed religious or mystical doctrine, nor is it embraced in any particular document or scripture. Rather, it is ritualistic because it follows a predictable, stereotyped pattern which embraces a number of elements, as in a ritual.



The elements of a Ritual Defamation are these:



  1. In a ritual defamation the victim must have violated a particular taboo in some way, usually by expressing or identifying with a forbidden attitude, opinion or belief. It is not necessary that he “do” anything about it or undertake any particular course of action, only that he engage in some form of communication or expression. #no-deed


  2. The method of attack in a ritual defamation is to assail the character of the victim, and never to offer more than a perfunctory challenge to the particular attitudes, opinions or beliefs expressed or implied. Character assassination is its primary tool. #character-assassination


  3. An important rule in ritual defamation is to avoid engaging in any kind of debate over the truthfulness or reasonableness of what has been expressed, only condemn it. To debate opens the issue up for examination and discussion of its merits, and to consider the evidence that may support it, which is just what the ritual defamer is trying to avoid. The primary goal of a ritual defamation is censorship and repression. #no-debate


  4. The victim is often somebody in the public eye—someone who is vulnerable to public opinion—although perhaps in a very modest way. It could be a schoolteacher, writer, businessman, minor official, or merely an outspoken citizen. Visibility enhances vulnerability to ritual defamation. #vulnerable


  5. An attempt, often successful, is made to involve others in the defamation. In the case of a public official, other public officials will be urged to denounce the offender. In the case of a student, other students will be called upon, and so on. #mob


  6. In order for a ritual defamation to be effective, the victim must be dehumanized to the extent that he becomes identical with the offending attitude, opinion or belief, and in a manner which distorts it to the point where it appears at its most extreme. For example, a victim who is defamed as a “subversive” will be identified with the worst images of subversion, such as espionage, terrorism or treason. A victim defamed as a “pervert” will be identified with the worst images of perversion, including child molestation and rape. A victim defamed as a “racist” or “anti-Semitic” will be identified with the worst images of racism or anti-Semitism, such as lynchings or gas chambers. #exaggeration


  7. Also to be successful, a ritual defamation must bring pressure and humiliation on the victim from every quarter, including family and friends. If the victim has school children, they may be taunted and ridiculed as a consequence of adverse publicity. If they are employed, they may be fired from their job. If the victim belongs to clubs or associations, other members may be urged to expel them. #humiliation


  8. Any explanation the victim may offer, including the claim of being misunderstood, is considered irrelevant. To claim truth as a defense for a politically incorrect value, opinion or belief is interpreted as defiance and only compounds the problem. Ritual defamation is often not necessarily an issue of being wrong or incorrect but rather of “insensitivity” and failing to observe social taboos. #insensitivity


An interesting aspect of ritual defamation as a practice is its universality. It is not specific to any value, opinion or belief or to any group or subculture. It may be used for or against any political, ethnic, national or religious group. It may, for example, by anti-Semites against Jews, or by Jews against anti-Semites; by rightists against leftists or by leftists against rightists, and so on.



The power of ritual defamation lies entirely in its capacity to intimidate and terrorize. It embraces some elements of primitive superstitious belief, as in a “curse” or “hex.” It plays into the subconscious fear most people have of being abandoned or rejected by the tribe or by society and being cut off from social and psychological support systems. #peer-pressure



The weakness of ritual defamation lies in its tendency toward overkill and in its obvious maliciousness. Occasionally a ritual defamation will fail because of poor planning and failure to correctly judge the vulnerability of the victim or because its viciousness inadvertently generates sympathy.



It’s important to recognize and identify the patterns of a ritual defamation. Like all propaganda and disinformation campaigns it is accomplished primarily through the manipulation of words and symbols. It is not used to persuade, but to punish. Although it may have cognitive elements, its thrust is primarily emotional. Ritual Defamation is used to hurt, to intimidate, to destroy, and to persecute, and to avoid the dialogue, debate and discussion upon which a free society depends. On those grounds it must be opposed no matter who tries to justify its use. #emotional




References and Notes





  1. Laird Wilcox.


  2. The Practice of Ritual Defamation (Archived)

Recent Techrights' Posts

Free Software Community/Volunteers Aren't Circus Animals of GAFAM, IBM, Canonical and So On...
Playing with people's lives for capital gain or "entertainment" isn't acceptable
[Meme] The Cancer Culture
Mission accomplished?
Why the Articles From Daniel Pocock (FSFE, Fedora, Debian Etc. Insider) Still Matter a Lot
Revisionism will try to suggest that "it's not true" or "not true anymore" or "it's old anyway"...
 
Links 04/05/2024: Tesla a "Tech-Bubble", YouTube Ads When Pausing
Links for the day
Germany Transitioning to GNU/Linux
Why aren't more German federal states following the footsteps of Schleswig-Holstein?
IRC Proceedings: Friday, May 03, 2024
IRC logs for Friday, May 03, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Alexander Wirt, Bucha executions & Debian political prisoners
Reprinted with permission from disguised.work
Links 03/05/2024: Clownflare Collapses and China Deploys Homegrown Aircraft Carrier
Links for the day
IBM's Decision to Acquire HashiCorp is Bad News for Red Hat
IBM acquired functionality that it had already acquired before
Apparently Mass Layoffs at Microsoft Again (Late Friday), Meaning Mass Layoffs Every Month This Year Including May
not familiar with the source site though
Gemini Links 03/05/2024: Diaspora Still Alive and Fight Against Fake News
Links for the day
[Meme] Reserving Scorn for Those Who Expose the Misconduct
they like to frame truth-tellers as 'harassers'
Links 03/05/2024: Canada Euthanising Its Poor and Disabled, Call for Julian Assange's Freedom
Links for the day
Dashamir Hoxha & Debian harassment
Reprinted with permission from disguised.work
Maria Glukhova, Dmitry Bogatov & Debian Russia, Google, debian-private leaks
Reprinted with permission from disguised.work
Who really owns Debian: Ubuntu or Google?
Reprinted with permission from disguised.work
Keeping Computers at the Hands of Their Owners
There's a reason why this site's name (or introduction) does not obsess over trademarks and such
In May 2024 (So Far) statCounter's Measure of Linux 'Market Share' is Back at 7% (ChromeOS Included)
for several months in a row ChromeOS (that would be Chromebooks) is growing
Links 03/05/2024: Microsoft Shutting Down Xbox 360 Store and the 360 Marketplace
Links for the day
Evidence: Ireland, European Parliament 2024 election interference, fake news, Wikipedia, Google, WIPO, FSFE & Debian
Reprinted with permission from Daniel Pocock
Enforcing the Debian Social Contract with Uncensored.Deb.Ian.Community
Reprinted with permission from Daniel Pocock
Gemini Links 03/05/2024: Antenna Needs Your Gemlog, a Look at Gemini Get
Links for the day
IRC Proceedings: Thursday, May 02, 2024
IRC logs for Thursday, May 02, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Jonathan Carter & Debian: fascism hiding in broad daylight
Reprinted with permission from disguised.work
Gunnar Wolf & Debian: fascism, anti-semitism and crucifixion
Reprinted with permission from disguised.work
Links 01/05/2024: Take-Two Interactive Layoffs and Post Office (Horizon System, Proprietary) Scandal Not Over
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, May 01, 2024
IRC logs for Wednesday, May 01, 2024
Embrace, Extend, Replace the Original (Or Just Hijack the Word 'Sudo')
First comment? A Microsoft employee
Gemini Links 02/05/2024: Firewall Rules Etiquette and Self Host All The Things
Links for the day